Via Bruce Schneier's blog
(http://www.schneier.com/blog/archives/2008/08/a_security_asse.html)
at (http://www.cpni.gov.uk/Docs/InternetProtocol.pdf)

=====
August 20, 2008
A Security Assessment of the Internet Protocol

Preface

The TCP/IP protocols were conceived during a time that was quite
different from the hostile environment they operate in now. Yet a
direct result of their effectiveness and widespread early adoption is
that much of today's global economy remains dependent upon them.

While many textbooks and articles have created the myth that the
Internet Protocols (IP) were designed for warfare environments, the
top level goal for the DARPA Internet Program was the sharing of large
service machines on the ARPANET. As a result, many protocol
specifications focus only on the operational aspects of the protocols
they specify and overlook their security implications.

[...]

Much of the effort of the security community on the Internet protocols
did not result in official documents (RFCs) being issued by the IETF
(Internet Engineering Task Force) leading to a situation in which
"known" security problems have not always been addressed by all
vendors. In many cases vendors have implemented quick "fixes" to
protocol flaws without a careful analysis of their effectiveness and
their impact on interoperability.

As a result, any system built in the future according to the official
TCP/IP specifications might reincarnate security flaws that have
already hit our communication systems in the past.

[...]

This document is the result of an assessment of the IETF
specifications of the Internet Protocol from a security point of view.
Possible threats were identified and, where possible, counter-measures
were proposed. Additionally, many implementation flaws that have led
to security vulnerabilities have been referenced in the hope that
future implementations will not incur the same problems. This document
does not limit itself to performing a security assessment of the
relevant IETF specification but also offers an assessment of common
implementation strategies.

Whilst not aiming to be the final word on the security of the IP, this
document aims to raise awareness about the many security threats based
on the IP protocol that have been faced in the past, those that we are
currently facing, and those we may still have to deal with in the
future. It provides advice for the secure implementation of the IP,
and also insights about the security aspects of the IP that may be of
help to the Internet operations community.

[...]
=====
-- 
Soh Kam Yung
my Google Reader Shared links:
(http://www.google.com/reader/shared/16851815156817689753)
my Google Reader Shared SFAS links:
(http://www.google.com/reader/shared/user/16851815156817689753/label/sfas)

_______________________________________________
Slugnet mailing list
[email protected]
http://wiki.lugs.org.sg/LugsMailingListFaq
http://www.lugs.org.sg/mailman/listinfo/slugnet

Reply via email to